Analysis

  • max time kernel
    150s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    31/01/2025, 10:00

General

  • Target

    services.png.exe

  • Size

    264KB

  • MD5

    d397a1de162f332782fe3205a07792dd

  • SHA1

    44793b3a374c3cb453bbd87a2fd28d8a4c408002

  • SHA256

    ea251bf7fcc0a42cb9e954a45d925ef379ef1ffca39e482f44af701b4ace8560

  • SHA512

    6be10fc6ebabffadd89a72862c5d292e2939d165298019fe684de4efb3284603756c8764810835c12651ad49f608dd3345c8d778b7fd795683f0fcceeaa3f659

  • SSDEEP

    6144:VtjNiEZdoTD3wad4eq5OxUatA04d0drsFp2A4AG5uU:VTdS3Uek0WchA2D

Malware Config

Extracted

Family

asyncrat

Botnet

Default

C2

127.0.0.1:6606

127.0.0.1:7707

127.0.0.1:8808

https://api.telegram.org/bot6987227198:AAGW8xEs5eNdfO7EF-8152h-RqJkKbn52BE/sendMessage?chat_id=1075483951

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • Modifies security service 2 TTPs 2 IoCs
  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 2 IoCs
  • Stormkitty family
  • Async RAT payload 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Creates new service(s) 2 TTPs
  • Downloads MZ/PE file 3 IoCs
  • Drops file in Drivers directory 2 IoCs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Stops running service(s) 4 TTPs
  • Executes dropped EXE 5 IoCs
  • Indicator Removal: Clear Windows Event Logs 1 TTPs 2 IoCs

    Clear Windows Event Logs to hide the activity of an intrusion.

  • Loads dropped DLL 19 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops desktop.ini file(s) 6 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Looks up geolocation information via web service

    Uses a legitimate geolocation service to find the infected system's geolocation info.

  • Network Share Discovery 1 TTPs

    Attempt to gather information on host network.

  • Power Settings 1 TTPs 8 IoCs

    powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

  • Drops file in System32 directory 5 IoCs
  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 11 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 3 IoCs
  • Launches sc.exe 14 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 9 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 18 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs

    Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.

  • Checks processor information in registry 2 TTPs 12 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies data under HKEY_USERS 6 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:432
    • C:\Windows\system32\services.exe
      C:\Windows\system32\services.exe
      1⤵
      • Sets service image path in registry
      • Loads dropped DLL
      PID:476
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k DcomLaunch
        2⤵
          PID:592
          • C:\Windows\system32\DllHost.exe
            C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
            3⤵
              PID:1440
            • C:\Windows\system32\wbem\wmiprvse.exe
              C:\Windows\system32\wbem\wmiprvse.exe
              3⤵
              • Drops file in System32 directory
              PID:756
            • C:\Windows\system32\wbem\wmiprvse.exe
              C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
              3⤵
              • Checks processor information in registry
              PID:664
            • C:\Windows\system32\DllHost.exe
              C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
              3⤵
                PID:688
              • C:\Program Files\Windows Mail\WinMail.exe
                "C:\Program Files\Windows Mail\WinMail.exe" -Embedding
                3⤵
                • NTFS ADS
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SendNotifyMessage
                • Suspicious use of SetWindowsHookEx
                PID:2940
            • C:\Windows\system32\svchost.exe
              C:\Windows\system32\svchost.exe -k RPCSS
              2⤵
                PID:672
              • C:\Windows\System32\svchost.exe
                C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
                2⤵
                • Modifies security service
                • Indicator Removal: Clear Windows Event Logs
                PID:744
              • C:\Windows\System32\svchost.exe
                C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
                2⤵
                  PID:812
                  • C:\Windows\system32\Dwm.exe
                    "C:\Windows\system32\Dwm.exe"
                    3⤵
                      PID:1160
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k netsvcs
                    2⤵
                    • Drops file in Windows directory
                    PID:848
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k LocalService
                    2⤵
                      PID:964
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k NetworkService
                      2⤵
                        PID:108
                      • C:\Windows\System32\spoolsv.exe
                        C:\Windows\System32\spoolsv.exe
                        2⤵
                          PID:1020
                        • C:\Windows\system32\svchost.exe
                          C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork
                          2⤵
                            PID:1060
                          • C:\Windows\system32\taskhost.exe
                            "taskhost.exe"
                            2⤵
                              PID:1100
                            • C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE
                              "C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"
                              2⤵
                                PID:1712
                              • C:\Windows\system32\svchost.exe
                                C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation
                                2⤵
                                  PID:1964
                                • C:\Windows\system32\sppsvc.exe
                                  C:\Windows\system32\sppsvc.exe
                                  2⤵
                                    PID:772
                                  • C:\ProgramData\Google\Chrome\updater.exe
                                    C:\ProgramData\Google\Chrome\updater.exe
                                    2⤵
                                    • Drops file in Drivers directory
                                    • Executes dropped EXE
                                    • Drops file in System32 directory
                                    • Suspicious use of SetThreadContext
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:1920
                                    • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                      C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                                      3⤵
                                      • Command and Scripting Interpreter: PowerShell
                                      • Drops file in System32 directory
                                      • Modifies data under HKEY_USERS
                                      PID:2992
                                    • C:\Windows\system32\cmd.exe
                                      C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
                                      3⤵
                                        PID:2892
                                        • C:\Windows\system32\wusa.exe
                                          wusa /uninstall /kb:890830 /quiet /norestart
                                          4⤵
                                          • Drops file in Windows directory
                                          PID:2592
                                      • C:\Windows\system32\sc.exe
                                        C:\Windows\system32\sc.exe stop UsoSvc
                                        3⤵
                                        • Launches sc.exe
                                        PID:300
                                      • C:\Windows\system32\sc.exe
                                        C:\Windows\system32\sc.exe stop WaaSMedicSvc
                                        3⤵
                                        • Launches sc.exe
                                        PID:1508
                                      • C:\Windows\system32\sc.exe
                                        C:\Windows\system32\sc.exe stop wuauserv
                                        3⤵
                                        • Launches sc.exe
                                        PID:3016
                                      • C:\Windows\system32\sc.exe
                                        C:\Windows\system32\sc.exe stop bits
                                        3⤵
                                        • Launches sc.exe
                                        PID:2732
                                      • C:\Windows\system32\sc.exe
                                        C:\Windows\system32\sc.exe stop dosvc
                                        3⤵
                                        • Launches sc.exe
                                        PID:2804
                                      • C:\Windows\system32\powercfg.exe
                                        C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                                        3⤵
                                        • Power Settings
                                        PID:352
                                      • C:\Windows\system32\powercfg.exe
                                        C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
                                        3⤵
                                        • Power Settings
                                        PID:1988
                                      • C:\Windows\system32\powercfg.exe
                                        C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                                        3⤵
                                        • Power Settings
                                        PID:1980
                                      • C:\Windows\system32\powercfg.exe
                                        C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                                        3⤵
                                        • Power Settings
                                        PID:2156
                                      • C:\Windows\system32\dialer.exe
                                        C:\Windows\system32\dialer.exe
                                        3⤵
                                          PID:2932
                                        • C:\Windows\system32\dialer.exe
                                          C:\Windows\system32\dialer.exe
                                          3⤵
                                            PID:2160
                                          • C:\Windows\system32\dialer.exe
                                            dialer.exe
                                            3⤵
                                            • Modifies data under HKEY_USERS
                                            PID:696
                                      • C:\Windows\system32\lsass.exe
                                        C:\Windows\system32\lsass.exe
                                        1⤵
                                          PID:492
                                        • C:\Windows\system32\lsm.exe
                                          C:\Windows\system32\lsm.exe
                                          1⤵
                                            PID:500
                                          • C:\Windows\Explorer.EXE
                                            C:\Windows\Explorer.EXE
                                            1⤵
                                              PID:1188
                                              • C:\Users\Admin\AppData\Local\Temp\services.png.exe
                                                "C:\Users\Admin\AppData\Local\Temp\services.png.exe"
                                                2⤵
                                                • Loads dropped DLL
                                                • System Location Discovery: System Language Discovery
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious use of AdjustPrivilegeToken
                                                • Suspicious use of WriteProcessMemory
                                                PID:1804
                                                • C:\Users\Admin\AppData\Roaming\Fuyclyizy\ywquammebid.exe
                                                  "C:\Users\Admin\AppData\Roaming\Fuyclyizy\ywquammebid.exe"
                                                  3⤵
                                                  • Downloads MZ/PE file
                                                  • Executes dropped EXE
                                                  • Loads dropped DLL
                                                  • Adds Run key to start application
                                                  • System Location Discovery: System Language Discovery
                                                  • Modifies system certificate store
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  • Suspicious use of WriteProcessMemory
                                                  PID:2528
                                                  • C:\Windows\SysWOW64\cmd.exe
                                                    cmd.exe
                                                    4⤵
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious use of WriteProcessMemory
                                                    PID:1924
                                                    • C:\Windows\SysWOW64\HOSTNAME.EXE
                                                      hostname
                                                      5⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:788
                                                    • C:\Windows\SysWOW64\ipconfig.exe
                                                      ipconfig /all
                                                      5⤵
                                                      • System Location Discovery: System Language Discovery
                                                      • Gathers network information
                                                      PID:1704
                                                    • C:\Windows\SysWOW64\tasklist.exe
                                                      tasklist
                                                      5⤵
                                                      • Enumerates processes with tasklist
                                                      • System Location Discovery: System Language Discovery
                                                      PID:2000
                                                    • C:\Windows\SysWOW64\netsh.exe
                                                      netsh firewall set opmode disable
                                                      5⤵
                                                      • Modifies Windows Firewall
                                                      • Event Triggered Execution: Netsh Helper DLL
                                                      • System Location Discovery: System Language Discovery
                                                      PID:2292
                                                    • C:\Windows\SysWOW64\net.exe
                                                      net share
                                                      5⤵
                                                      • System Location Discovery: System Language Discovery
                                                      • Suspicious use of WriteProcessMemory
                                                      PID:2944
                                                      • C:\Windows\SysWOW64\net1.exe
                                                        C:\Windows\system32\net1 share
                                                        6⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:2696
                                                  • C:\Users\Admin\AppData\Local\Temp\tmpb87cf536\UIServices.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\tmpb87cf536\UIServices.exe"
                                                    4⤵
                                                    • Executes dropped EXE
                                                    • Drops desktop.ini file(s)
                                                    • Suspicious use of SetThreadContext
                                                    • System Location Discovery: System Language Discovery
                                                    • Checks processor information in registry
                                                    • Modifies Internet Explorer settings
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:776
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      "cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All
                                                      5⤵
                                                      • Suspicious use of SetThreadContext
                                                      • System Location Discovery: System Language Discovery
                                                      • System Network Configuration Discovery: Wi-Fi Discovery
                                                      PID:2424
                                                      • C:\Windows\SysWOW64\chcp.com
                                                        chcp 65001
                                                        6⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:2748
                                                      • C:\Windows\SysWOW64\netsh.exe
                                                        netsh wlan show profile
                                                        6⤵
                                                        • Event Triggered Execution: Netsh Helper DLL
                                                        • System Location Discovery: System Language Discovery
                                                        • System Network Configuration Discovery: Wi-Fi Discovery
                                                        PID:2452
                                                      • C:\Windows\SysWOW64\findstr.exe
                                                        findstr All
                                                        6⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:2088
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      "cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid
                                                      5⤵
                                                      • Suspicious use of SetThreadContext
                                                      • System Location Discovery: System Language Discovery
                                                      PID:1604
                                                      • C:\Windows\SysWOW64\chcp.com
                                                        chcp 65001
                                                        6⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:1668
                                                      • C:\Windows\SysWOW64\netsh.exe
                                                        netsh wlan show networks mode=bssid
                                                        6⤵
                                                        • Event Triggered Execution: Netsh Helper DLL
                                                        • System Location Discovery: System Language Discovery
                                                        PID:2088
                                                  • C:\Users\Admin\AppData\Local\Temp\tmp5fc2b8f4\smbhost.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\tmp5fc2b8f4\smbhost.exe"
                                                    4⤵
                                                    • Drops file in Drivers directory
                                                    • Executes dropped EXE
                                                    • Drops file in System32 directory
                                                    • Suspicious use of SetThreadContext
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:2820
                                                    • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                                      C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                                                      5⤵
                                                      • Command and Scripting Interpreter: PowerShell
                                                      • Drops file in System32 directory
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      PID:896
                                                    • C:\Windows\system32\cmd.exe
                                                      C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
                                                      5⤵
                                                        PID:880
                                                        • C:\Windows\system32\wusa.exe
                                                          wusa /uninstall /kb:890830 /quiet /norestart
                                                          6⤵
                                                          • Drops file in Windows directory
                                                          PID:2356
                                                      • C:\Windows\system32\sc.exe
                                                        C:\Windows\system32\sc.exe stop UsoSvc
                                                        5⤵
                                                        • Launches sc.exe
                                                        PID:264
                                                      • C:\Windows\system32\sc.exe
                                                        C:\Windows\system32\sc.exe stop WaaSMedicSvc
                                                        5⤵
                                                        • Launches sc.exe
                                                        PID:1704
                                                      • C:\Windows\system32\sc.exe
                                                        C:\Windows\system32\sc.exe stop wuauserv
                                                        5⤵
                                                        • Launches sc.exe
                                                        PID:2568
                                                      • C:\Windows\system32\sc.exe
                                                        C:\Windows\system32\sc.exe stop bits
                                                        5⤵
                                                        • Launches sc.exe
                                                        PID:1576
                                                      • C:\Windows\system32\sc.exe
                                                        C:\Windows\system32\sc.exe stop dosvc
                                                        5⤵
                                                        • Launches sc.exe
                                                        PID:2936
                                                      • C:\Windows\system32\powercfg.exe
                                                        C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                                                        5⤵
                                                        • Power Settings
                                                        PID:2284
                                                      • C:\Windows\system32\powercfg.exe
                                                        C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
                                                        5⤵
                                                        • Power Settings
                                                        PID:2780
                                                      • C:\Windows\system32\powercfg.exe
                                                        C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                                                        5⤵
                                                        • Power Settings
                                                        PID:2352
                                                      • C:\Windows\system32\powercfg.exe
                                                        C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                                                        5⤵
                                                        • Power Settings
                                                        PID:2148
                                                      • C:\Windows\system32\dialer.exe
                                                        C:\Windows\system32\dialer.exe
                                                        5⤵
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        PID:1320
                                                      • C:\Windows\system32\sc.exe
                                                        C:\Windows\system32\sc.exe delete "GoogleUpdateTaskMachineQC"
                                                        5⤵
                                                        • Launches sc.exe
                                                        PID:2968
                                                      • C:\Windows\system32\sc.exe
                                                        C:\Windows\system32\sc.exe create "GoogleUpdateTaskMachineQC" binpath= "C:\ProgramData\Google\Chrome\updater.exe" start= "auto"
                                                        5⤵
                                                        • Launches sc.exe
                                                        PID:2648
                                                      • C:\Windows\system32\sc.exe
                                                        C:\Windows\system32\sc.exe stop eventlog
                                                        5⤵
                                                        • Launches sc.exe
                                                        PID:2560
                                                      • C:\Windows\system32\sc.exe
                                                        C:\Windows\system32\sc.exe start "GoogleUpdateTaskMachineQC"
                                                        5⤵
                                                        • Launches sc.exe
                                                        PID:2760
                                                      • C:\Windows\system32\cmd.exe
                                                        C:\Windows\system32\cmd.exe /c choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\tmp5fc2b8f4\smbhost.exe"
                                                        5⤵
                                                          PID:1120
                                                          • C:\Windows\system32\choice.exe
                                                            choice /C Y /N /D Y /T 3
                                                            6⤵
                                                              PID:1616
                                                        • C:\Users\Admin\AppData\Local\Temp\tmp6c8703be\SearchUI.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\tmp6c8703be\SearchUI.exe"
                                                          4⤵
                                                          • Executes dropped EXE
                                                          • System Location Discovery: System Language Discovery
                                                          • Checks processor information in registry
                                                          PID:944
                                                  • C:\Windows\system32\conhost.exe
                                                    \??\C:\Windows\system32\conhost.exe "841215402-1103076719-1868372208771985712-81307184817887245751619752628-1252520816"
                                                    1⤵
                                                      PID:2340
                                                    • C:\Windows\system32\conhost.exe
                                                      \??\C:\Windows\system32\conhost.exe "75873672-6539417034278052941440520146-662840111-1459161173-1290124517983263807"
                                                      1⤵
                                                        PID:2608
                                                      • C:\Windows\system32\conhost.exe
                                                        \??\C:\Windows\system32\conhost.exe "9611305661503684569-10721818251571207513-1902898541-1814588456-1216617637-1220528118"
                                                        1⤵
                                                          PID:2616
                                                        • C:\Windows\system32\conhost.exe
                                                          \??\C:\Windows\system32\conhost.exe "-3125071951157382596682322215-1547760031343793608-7319317141517674496-530040815"
                                                          1⤵
                                                            PID:2804
                                                          • C:\Windows\system32\conhost.exe
                                                            \??\C:\Windows\system32\conhost.exe "-18527479759104999451011739969-483625001232579143-158765822142400735-673802402"
                                                            1⤵
                                                              PID:2744
                                                            • C:\Windows\system32\conhost.exe
                                                              \??\C:\Windows\system32\conhost.exe "-1821721023112856662-545537562-1357626704-20138830358206235575396965981668603836"
                                                              1⤵
                                                                PID:2724
                                                              • C:\Windows\system32\conhost.exe
                                                                \??\C:\Windows\system32\conhost.exe "-202554393809173408-1003446540-7858277352034527774-829233011824694957-1680441723"
                                                                1⤵
                                                                  PID:1276
                                                                • C:\Windows\system32\conhost.exe
                                                                  \??\C:\Windows\system32\conhost.exe "-15043945951835073613-579452866511167771420233137129170366110595858012015676139"
                                                                  1⤵
                                                                    PID:2588
                                                                  • C:\Windows\system32\conhost.exe
                                                                    \??\C:\Windows\system32\conhost.exe "-18010193791897038160-7767670302085802001-350807489-1802522166-2087375314-381818314"
                                                                    1⤵
                                                                      PID:2360
                                                                    • C:\Windows\system32\conhost.exe
                                                                      \??\C:\Windows\system32\conhost.exe "565086969-1841902522325075000-18577559141098821092-1218529199-1028514191561591007"
                                                                      1⤵
                                                                        PID:1536
                                                                      • C:\Windows\system32\conhost.exe
                                                                        \??\C:\Windows\system32\conhost.exe "421798447749941276-1241432036-13884893352113730328-1399743508-18523868831071296075"
                                                                        1⤵
                                                                          PID:2252
                                                                        • C:\Windows\system32\conhost.exe
                                                                          \??\C:\Windows\system32\conhost.exe "-16497283646094901691567157748-1409937679-1521983310-7004962871155756101-571068448"
                                                                          1⤵
                                                                            PID:2744
                                                                          • C:\Windows\system32\conhost.exe
                                                                            \??\C:\Windows\system32\conhost.exe "-57917438515821474931566373543-322396246-1994307536-1562736092460152119-2006217143"
                                                                            1⤵
                                                                              PID:264
                                                                            • C:\Windows\system32\conhost.exe
                                                                              \??\C:\Windows\system32\conhost.exe "-18960617021065031053-1657401835-6689972981185618850142660905520009419721219443539"
                                                                              1⤵
                                                                                PID:1648
                                                                              • C:\Windows\system32\conhost.exe
                                                                                \??\C:\Windows\system32\conhost.exe "1370914616-2091968517-2077985400188783117018157134062026827130-6874543031835970897"
                                                                                1⤵
                                                                                  PID:1764
                                                                                • C:\Windows\system32\conhost.exe
                                                                                  \??\C:\Windows\system32\conhost.exe "-295124016-65843619778807711-743772807834374048-10592273221340712453109003069"
                                                                                  1⤵
                                                                                    PID:2208
                                                                                  • C:\Windows\system32\conhost.exe
                                                                                    \??\C:\Windows\system32\conhost.exe "437649168487831885-193196024672738775517294502952001609576-917905604-84141426"
                                                                                    1⤵
                                                                                      PID:1328

                                                                                    Network

                                                                                    MITRE ATT&CK Enterprise v15

                                                                                    Replay Monitor

                                                                                    Loading Replay Monitor...

                                                                                    Downloads

                                                                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751

                                                                                      Filesize

                                                                                      192B

                                                                                      MD5

                                                                                      f4f839b52717e0e2f28e846fd7cdb580

                                                                                      SHA1

                                                                                      84ad957a78a510a582e5951af350da46f19a21a6

                                                                                      SHA256

                                                                                      59d13e519f495223e28ca1509ea40f66f62aad728cc538848e11983a1732e69d

                                                                                      SHA512

                                                                                      b6854ae8794a73e5da379839d55cedcda2ea6042efbad6066dd568df4ccdca177623cd6610504dae3807119defa9c950607c72eeb7a88bed96ab4602c0088408

                                                                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                      Filesize

                                                                                      342B

                                                                                      MD5

                                                                                      d514e3928230022d45ac872280750d61

                                                                                      SHA1

                                                                                      391019838489e3c79e6fd89554d67847999ffa10

                                                                                      SHA256

                                                                                      c44df55f90a6a53f2b4a17f01c5dea7c5371c4e11476efc2dfe5d29999010800

                                                                                      SHA512

                                                                                      d552c9a13fcc354210adef25a9480284c99fcec1f40564779d79d7d7b1b5973e8a14d09bf70124eff4562d52463270d71bd3e3b922074735217075f205bfbe06

                                                                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E6024EAC88E6B6165D49FE3C95ADD735

                                                                                      Filesize

                                                                                      232B

                                                                                      MD5

                                                                                      cf79bd5a432d8bde76e73a5d9cb314c9

                                                                                      SHA1

                                                                                      9753d7b616ef8adf1f5d3f955f3aa1cd336a7536

                                                                                      SHA256

                                                                                      c80e3045a52b070f32d5b1e0d0444a4de983baa9aea050bb0afb468c985f7310

                                                                                      SHA512

                                                                                      f5d078c730746d0645f3d503f88a22d99a546bf8f19b900f96a05a1a1c1dc19745b5ad2a06107eff86a2a5d5352d4f1d6b1f0a16e19da0f3185eb6fd30e60065

                                                                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

                                                                                      Filesize

                                                                                      242B

                                                                                      MD5

                                                                                      a281b3bbb00c1f9790f3fdf402b3efe8

                                                                                      SHA1

                                                                                      e529ae50a515f7e4b0e52e0a5eb4e34ab8984cc6

                                                                                      SHA256

                                                                                      138268a1c056cb948f4be1906c6b9fae8ed0ff52c124d6df1dd0454b4b8c096e

                                                                                      SHA512

                                                                                      20f46db2459c63b9fa27325ed36d9636895f3a2ff9e8cd33e332680a13b2a5314310a09f2e6c1e3a6e5aa0e61fb51bb608eb40addcfe16a7f1a1e3e99e7ff638

                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\edb.log

                                                                                      Filesize

                                                                                      2.0MB

                                                                                      MD5

                                                                                      ad9100855b7d2d1694b80f533e565373

                                                                                      SHA1

                                                                                      84b826ebfaca0ad8dcbed5c873fe4d2370ba38b9

                                                                                      SHA256

                                                                                      5ef23b00f5b26c34bd0375c20fcfcc6ee7063f53233e11e8415891d6ba5b338e

                                                                                      SHA512

                                                                                      488122a7e32ee047ba88cf63a5f22451a60ee3aa5085987e2fd134754ea5fd03ec2068c40d9cdea4b4b1d9ae61d418b179a26f640e42d4231387c18ae2d0b639

                                                                                    • C:\Users\Admin\AppData\Local\Temp\Cab8F45.tmp

                                                                                      Filesize

                                                                                      70KB

                                                                                      MD5

                                                                                      49aebf8cbd62d92ac215b2923fb1b9f5

                                                                                      SHA1

                                                                                      1723be06719828dda65ad804298d0431f6aff976

                                                                                      SHA256

                                                                                      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                                                                                      SHA512

                                                                                      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                                                                                    • C:\Users\Admin\AppData\Local\cf4513f78e94d3d33af18a9951a75e10\msgid.dat

                                                                                      Filesize

                                                                                      1B

                                                                                      MD5

                                                                                      cfcd208495d565ef66e7dff9f98764da

                                                                                      SHA1

                                                                                      b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                                                                      SHA256

                                                                                      5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                                                                      SHA512

                                                                                      31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                                                                                    • C:\Users\Admin\AppData\Roaming\Evrahiotn\ogiwdyvaad.geb

                                                                                      Filesize

                                                                                      606KB

                                                                                      MD5

                                                                                      5814939ad656cb2e0caff89fd92e5561

                                                                                      SHA1

                                                                                      3b15ed3948598c11f3a678eb9a983c0b17c81f78

                                                                                      SHA256

                                                                                      01cf39d8c61aa262026452578fc603ad71e6ad1cfe3878001bea4dcc67cd1a15

                                                                                      SHA512

                                                                                      463263b79cc97530502ef0aec27eca33bb948fc6190ebeb0e6462b0b6bfcb08c0b8fa3012310b65b6a3e9d7fe842788ed25f13b307ce22c54ed0cd356699759a

                                                                                    • C:\Users\Admin\AppData\Roaming\Zabeopqouk\ykduqyyvvy.vig

                                                                                      Filesize

                                                                                      8KB

                                                                                      MD5

                                                                                      d072fc543eeaaf75a55559291b71e3bb

                                                                                      SHA1

                                                                                      353816e4aa68de14016520e2ccf5bcc301afed6a

                                                                                      SHA256

                                                                                      5f3be60c58328496b07b6b0e08f8d2b85edc16f8d9102c8317dca5229b7a99a1

                                                                                      SHA512

                                                                                      75682013330391135a2abdeb6c56f5f46d445ab54d33ff1c2c3b6286bd11cda8e2fe39cc6d48766b794f57831caad173f101f88fde827b645df35be59e733df0

                                                                                    • C:\Users\Admin\AppData\Roaming\Zabeopqouk\ykduqyyvvy.vig

                                                                                      Filesize

                                                                                      13KB

                                                                                      MD5

                                                                                      7183d74762863a09565bfc07fd130c46

                                                                                      SHA1

                                                                                      12b95541f8222ae8cacbae369ee6fd8a23a4f37a

                                                                                      SHA256

                                                                                      c8058aa9f71a3a5a2537ae0c93a7248a296d72a0eb2906437477330efbb5b6d5

                                                                                      SHA512

                                                                                      c9d04b9a253dac6c96b59cc5d607a878798f1798971998ac7210689d9e0ee57db43866478c8ac3f26af369d74d0778056bfec1467e1023909129066aba2a696e

                                                                                    • C:\Windows\system32\drivers\etc\hosts

                                                                                      Filesize

                                                                                      3KB

                                                                                      MD5

                                                                                      7f00c36bf9255f977c67b852ba5dcd53

                                                                                      SHA1

                                                                                      f3503bdb5d5a580ffa8f9dd83e35c204a5f5c149

                                                                                      SHA256

                                                                                      167986dfdf7d2e14742a08afdad0cb4eb2a15ed85735133a122ff0ae302b86de

                                                                                      SHA512

                                                                                      6fe4fe7e74148959aa0da55e49b96780bdd1efafd196759faa9d5af4f127ed46834cb9f1fbdd5ac35cefedb19310e428079e2b8c788cb8e3efac8a99aa6f0fd2

                                                                                    • \Users\Admin\AppData\Local\Temp\tmp5fc2b8f4\smbhost.exe

                                                                                      Filesize

                                                                                      5.3MB

                                                                                      MD5

                                                                                      b7c617a44000e6e30462ffdd5a27ba4f

                                                                                      SHA1

                                                                                      dffbd2089913059c730f751c9349d98dbc5e4f3f

                                                                                      SHA256

                                                                                      f2b0f9d4f4109891d7a92f3c9e22c0fb748d36bf564eebf74a0055056e307b45

                                                                                      SHA512

                                                                                      74fbc1b3ebd412c501b787974a0a7b597934accfb2eb2f47ae697bbb93db2de6824ae4cae3cb2b0783b592b4337d3eebce1a4748201653a143d326a238612181

                                                                                    • \Users\Admin\AppData\Local\Temp\tmp6c8703be\SearchUI.exe

                                                                                      Filesize

                                                                                      17KB

                                                                                      MD5

                                                                                      d72791d9eb757581772716a7573c4a4c

                                                                                      SHA1

                                                                                      8fa5d920023a9ff0b5329fd605d4b176783cc32d

                                                                                      SHA256

                                                                                      b87870c36a1c770960979d8958aeb12c0537b5287bd420555931e6f4a28bbebf

                                                                                      SHA512

                                                                                      b9a6c55c9fdc85e63e7228dfe260993f45cb492bbca6c90beb2c9e9f31e54406d7774292a4c19b7b12514d688bec41cf19c60a75ce16703158bf0edac3013563

                                                                                    • \Users\Admin\AppData\Local\Temp\tmpC35F.tmp

                                                                                      Filesize

                                                                                      1.2MB

                                                                                      MD5

                                                                                      d124f55b9393c976963407dff51ffa79

                                                                                      SHA1

                                                                                      2c7bbedd79791bfb866898c85b504186db610b5d

                                                                                      SHA256

                                                                                      ea1e16247c848c8c171c4cd1fa17bc5a018a1fcb0c0dac25009066b6667b8eef

                                                                                      SHA512

                                                                                      278fe3a4b1fbbe700e4f4483b610133e975e36e101455661d5197bd892a68839b9d555499040d200c92aefa9e3819380e395c0cd85d5fc845c6364d128a8cf06

                                                                                    • \Users\Admin\AppData\Local\Temp\tmpC360.tmp

                                                                                      Filesize

                                                                                      1.1MB

                                                                                      MD5

                                                                                      9b98d47916ead4f69ef51b56b0c2323c

                                                                                      SHA1

                                                                                      290a80b4ded0efc0fd00816f373fcea81a521330

                                                                                      SHA256

                                                                                      96e0ae104c9662d0d20fdf59844c2d18334e5847b6c4fc7f8ce4b3b87f39887b

                                                                                      SHA512

                                                                                      68b67021f228d8d71df4deb0b6388558b2f935a6aa466a12199cd37ada47ee588ea407b278d190d3a498b0ef3f5f1a2573a469b7ea5561ab2e7055c45565fe94

                                                                                    • \Users\Admin\AppData\Local\Temp\tmpb87cf536\UIServices.exe

                                                                                      Filesize

                                                                                      170KB

                                                                                      MD5

                                                                                      4376ea4b5ba0f8a061dc18342267e85c

                                                                                      SHA1

                                                                                      8d99fa9673835644c641ae4533f005dca4522f6c

                                                                                      SHA256

                                                                                      6508dd74c69d399050b07256b4b25cd66cfd774848d55fe330a9d77ad09ce03f

                                                                                      SHA512

                                                                                      24811d6dd05df0000b5d0948a833c49ef32a7e5fc3a5cab6c61e9331b6966026f03254eb1a8a9945e8a4e43d1e38bdebed2ec0e8337873de3386c4c4b5bde0a6

                                                                                    • \Users\Admin\AppData\Roaming\Fuyclyizy\ywquammebid.exe

                                                                                      Filesize

                                                                                      264KB

                                                                                      MD5

                                                                                      27cdfefc0b71da0030d940fe60b69532

                                                                                      SHA1

                                                                                      05a4203d3575549a497b3c7a5ad1c6c57eadb949

                                                                                      SHA256

                                                                                      46e234ab12a92b8bc3da447995d23fe20d04d4499446aa3b007ba342dcbef450

                                                                                      SHA512

                                                                                      f99cee8eb1658f6dcd6747fdbd19d93cfb19320afeb3b982fa6a0d47f39ba31c54671de8555534cec4f3f492cb62b01488b8d76037df131b9ecdd293026e310b

                                                                                    • memory/688-79-0x0000000000250000-0x0000000000297000-memory.dmp

                                                                                      Filesize

                                                                                      284KB

                                                                                    • memory/688-80-0x0000000000250000-0x0000000000297000-memory.dmp

                                                                                      Filesize

                                                                                      284KB

                                                                                    • memory/688-77-0x0000000000250000-0x0000000000297000-memory.dmp

                                                                                      Filesize

                                                                                      284KB

                                                                                    • memory/688-78-0x0000000000250000-0x0000000000297000-memory.dmp

                                                                                      Filesize

                                                                                      284KB

                                                                                    • memory/776-125-0x0000000000080000-0x00000000000C7000-memory.dmp

                                                                                      Filesize

                                                                                      284KB

                                                                                    • memory/776-270-0x0000000001370000-0x00000000013A0000-memory.dmp

                                                                                      Filesize

                                                                                      192KB

                                                                                    • memory/776-123-0x0000000000080000-0x00000000000C7000-memory.dmp

                                                                                      Filesize

                                                                                      284KB

                                                                                    • memory/896-1517-0x0000000001F40000-0x0000000001F48000-memory.dmp

                                                                                      Filesize

                                                                                      32KB

                                                                                    • memory/896-1516-0x000000001B5D0000-0x000000001B8B2000-memory.dmp

                                                                                      Filesize

                                                                                      2.9MB

                                                                                    • memory/944-1501-0x0000000000400000-0x000000000040F000-memory.dmp

                                                                                      Filesize

                                                                                      60KB

                                                                                    • memory/1100-36-0x00000000022C0000-0x0000000002307000-memory.dmp

                                                                                      Filesize

                                                                                      284KB

                                                                                    • memory/1100-38-0x00000000022C0000-0x0000000002307000-memory.dmp

                                                                                      Filesize

                                                                                      284KB

                                                                                    • memory/1100-40-0x00000000022C0000-0x0000000002307000-memory.dmp

                                                                                      Filesize

                                                                                      284KB

                                                                                    • memory/1100-42-0x00000000022C0000-0x0000000002307000-memory.dmp

                                                                                      Filesize

                                                                                      284KB

                                                                                    • memory/1100-34-0x00000000022C0000-0x0000000002307000-memory.dmp

                                                                                      Filesize

                                                                                      284KB

                                                                                    • memory/1160-46-0x0000000000130000-0x0000000000177000-memory.dmp

                                                                                      Filesize

                                                                                      284KB

                                                                                    • memory/1160-48-0x0000000000130000-0x0000000000177000-memory.dmp

                                                                                      Filesize

                                                                                      284KB

                                                                                    • memory/1160-45-0x0000000000130000-0x0000000000177000-memory.dmp

                                                                                      Filesize

                                                                                      284KB

                                                                                    • memory/1160-47-0x0000000000130000-0x0000000000177000-memory.dmp

                                                                                      Filesize

                                                                                      284KB

                                                                                    • memory/1188-53-0x0000000002A90000-0x0000000002AD7000-memory.dmp

                                                                                      Filesize

                                                                                      284KB

                                                                                    • memory/1188-50-0x0000000002A90000-0x0000000002AD7000-memory.dmp

                                                                                      Filesize

                                                                                      284KB

                                                                                    • memory/1188-52-0x0000000002A90000-0x0000000002AD7000-memory.dmp

                                                                                      Filesize

                                                                                      284KB

                                                                                    • memory/1188-51-0x0000000002A90000-0x0000000002AD7000-memory.dmp

                                                                                      Filesize

                                                                                      284KB

                                                                                    • memory/1440-58-0x00000000021C0000-0x0000000002207000-memory.dmp

                                                                                      Filesize

                                                                                      284KB

                                                                                    • memory/1440-56-0x00000000021C0000-0x0000000002207000-memory.dmp

                                                                                      Filesize

                                                                                      284KB

                                                                                    • memory/1440-60-0x00000000021C0000-0x0000000002207000-memory.dmp

                                                                                      Filesize

                                                                                      284KB

                                                                                    • memory/1440-62-0x00000000021C0000-0x0000000002207000-memory.dmp

                                                                                      Filesize

                                                                                      284KB

                                                                                    • memory/1804-74-0x0000000000550000-0x0000000000597000-memory.dmp

                                                                                      Filesize

                                                                                      284KB

                                                                                    • memory/1804-0-0x0000000000400000-0x0000000000447000-memory.dmp

                                                                                      Filesize

                                                                                      284KB

                                                                                    • memory/1804-1-0x0000000000400000-0x0000000000447000-memory.dmp

                                                                                      Filesize

                                                                                      284KB

                                                                                    • memory/1804-4-0x0000000000270000-0x0000000000271000-memory.dmp

                                                                                      Filesize

                                                                                      4KB

                                                                                    • memory/1804-2-0x0000000000270000-0x0000000000271000-memory.dmp

                                                                                      Filesize

                                                                                      4KB

                                                                                    • memory/1804-70-0x0000000000550000-0x0000000000597000-memory.dmp

                                                                                      Filesize

                                                                                      284KB

                                                                                    • memory/1804-72-0x0000000000550000-0x0000000000597000-memory.dmp

                                                                                      Filesize

                                                                                      284KB

                                                                                    • memory/1804-66-0x0000000000550000-0x0000000000597000-memory.dmp

                                                                                      Filesize

                                                                                      284KB

                                                                                    • memory/1804-68-0x0000000000550000-0x0000000000597000-memory.dmp

                                                                                      Filesize

                                                                                      284KB

                                                                                    • memory/2528-1509-0x0000000003F80000-0x0000000003F8F000-memory.dmp

                                                                                      Filesize

                                                                                      60KB

                                                                                    • memory/2528-1510-0x0000000003F80000-0x0000000003F8F000-memory.dmp

                                                                                      Filesize

                                                                                      60KB

                                                                                    • memory/2528-1496-0x0000000003F80000-0x0000000003F8F000-memory.dmp

                                                                                      Filesize

                                                                                      60KB

                                                                                    • memory/2528-1497-0x0000000003F80000-0x0000000003F8F000-memory.dmp

                                                                                      Filesize

                                                                                      60KB

                                                                                    • memory/2528-1475-0x0000000003F80000-0x0000000003F8F000-memory.dmp

                                                                                      Filesize

                                                                                      60KB

                                                                                    • memory/2992-1932-0x00000000008A0000-0x00000000008A8000-memory.dmp

                                                                                      Filesize

                                                                                      32KB

                                                                                    • memory/2992-1931-0x000000001A000000-0x000000001A2E2000-memory.dmp

                                                                                      Filesize

                                                                                      2.9MB